Static task
static1
Behavioral task
behavioral1
Sample
ad0a01e7553e897ca415eaa90d25185d7ac80baebea464fe810a62fdd9aa4e39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad0a01e7553e897ca415eaa90d25185d7ac80baebea464fe810a62fdd9aa4e39.exe
Resource
win10v2004-20221111-en
General
-
Target
ad0a01e7553e897ca415eaa90d25185d7ac80baebea464fe810a62fdd9aa4e39
-
Size
22KB
-
MD5
6cf6f62ca40b7bd3d36d44d581ace761
-
SHA1
dbf3bbf9824dbb7fd1af17717d9efa9037e9c765
-
SHA256
ad0a01e7553e897ca415eaa90d25185d7ac80baebea464fe810a62fdd9aa4e39
-
SHA512
bc3ebf363fad04d58a41032064f325a0377cd05efce7f1d6ad7855ea9716d7f7e8b81788e44800faa6909d0c43e6d4ba7b744b216a3b0e74576b06ee0e70544b
-
SSDEEP
384:abka1pdl5mT/H8ssq0Pba3GRU5Rk1ZETeNjg:ska17r0/DssSKiETEjg
Malware Config
Signatures
Files
-
ad0a01e7553e897ca415eaa90d25185d7ac80baebea464fe810a62fdd9aa4e39.exe windows x86
d1f639c543cc36b9e9cedcd0ebf560c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetFileTime
CreateFileA
GetWindowsDirectoryA
lstrlenA
SetCurrentDirectoryA
GetModuleFileNameA
GetModuleHandleA
WriteFile
SetFileTime
ExitProcess
CreateProcessA
SetFileAttributesA
CopyFileA
lstrcmpA
GetComputerNameA
WaitForSingleObject
CreateMutexA
CreateThread
TerminateThread
GetTickCount
GetCurrentThread
DeleteFileA
Sleep
advapi32
RegCreateKeyExA
GetUserNameA
RegCloseKey
RegDeleteValueA
RegSetValueExA
msvcrt
strcpy
malloc
strcat
srand
strlen
rand
free
memcmp
_strcmpi
strncpy
_except_handler3
memset
shell32
ShellExecuteA
user32
LoadCursorA
LoadIconA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
ShowWindow
SetTimer
MoveWindow
KillTimer
DefWindowProcA
wvsprintfA
wsprintfA
wininet
InternetGetConnectedState
ws2_32
Sections
Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE